News

Evolving cyberattacks call for shift to prediction and response

by
ePLDT | Jan 17, 2018

Businesses all over the world are bolstering their Cyber Security capabilities to counter evolving threats in cyberspace. In the Philippines, IDC predicts that by 2018, cyber security will be a “tier-1 business priority”, receiving fixed capital spending for roughly 30 percent of the top 1,000 local companies. While this is a welcome development, a local leader in providing data security also reminds businesses that establishing cyber security protocols is just as important as acquiring the software and technology in order to combat the ever-evolving cyberattacks.

Angel Redoble, Chief Information Security Officer of ePLDT

“Cyber attacks are becoming increasingly large-scale and multifaceted as there are now newer targets such as the cloud and mobile devices. In addition, new types of malware are continually being created, making it difficult for countermeasures to keep up with these threats,” admits Angel Redoble, Chief Information Security Officer of ePLDT, an industry-leading digital enabler of enterprises in the country.

One form of cyber attack that is increasing in popularity is application layer attacks. Imperva Incapsula, one of the DDoS Mitigation partners of ePLDT subsidiary IPC, notes in its Q1 2017 Global DDoS Threat Landscape Report that application layer attacks reached an all-time high of 1,099 attacks per week in the second quarter of 2017, a rise of 23% over the previous quarter’s 892. When successful, application layer attacks can mimic real, human behavior which makes it harder to detect and mitigate. By interfering with the application interface of a website, cybercriminals can alter elements such as text, logos, buttons, and hyperlinks. The many cases of defacement, which made headlines last year during the period leading to the national elections, is an example of this.

“The evolving cyber attacks just prove how critical investing in cyber security is. A single attack can halt businesses completely, and with security gaps increasing with every new technology introduced, cyber security is a must-have for every company that wishes to thrive in today’s age where digital innovation is a key driver of success,” says Redoble, a 23-year veteran in the industry and is now overseeing the cyber security operations of ePLDT.

Cover all bases by being proactive

“Companies must realize they cannot prevent all forms of attacks. There will always be new gaps and vulnerabilities within a system. In order to face these new attacks, companies have to tweak their overall approach to cyber security by adopting a proactive technique that covers the moments before an attack occurs, while an attack is ongoing, and the crucial period after where it may be possible for an attack to happen again,” said Redoble.

Another factor is that every new technology just adds another layer of risk, such as how cybercriminals are now utilizing IoT (Internet of Things) devices to amplify their attacks. With this, ePLDT recommends that a better approach to security is to start focusing on detection through the analysis of data. By collecting data from various sources, such as network traffic, user behavior, and reported attacks, a company can stop an attack before it causes any damage.

“In cases when an attack successfully infiltrates a system, detection protocols play a critical role in identifying the kind of attack early on so the company can take appropriate steps to mitigate or even prevent damage entirely,” said Redoble.

Wanted: Pros in security

ePLDT recognizes that this strategy is difficult to implement considering the lack of dedicated cyber security professionals in many organizations. As a solution, the company suggests handing over the reins of cyber security to IT and data security professionals.

“This step helps remove the burdensome workload of data security, as it entails 24/7, 365-days-a-year coverage from someone who has the skills, technology, and process required to protect businesses against the most devastating attacks,” says Redoble.

A leader in Cyber security services in the country, ePLDT’s Cyber Security portfolio is a suite of solutions that cover homegrown expertise, globally-recognized frameworks, and best-of-breed platforms to defend enterprises from multiple security risks, evolving threats, and malicious software attacks. Its portfolio is further boosted by ePLDT’s vast infrastructure network due to its 9 state-of-the-art data centers and is recognized internationally through its ISO 27001:2005 Information Security Management System (ISMS) certification.

Through its Cyber Security Laboratory and Security Operations Center, ePLDT combats cyberthreats using a security framework that focuses on four quadrants: Prediction, Prevention, Detection, and Response. Some of the lab’s activities include Reverse Engineering, which tracks the source of vulnerability through malware analysis; and Digital Forensics, which identifies and analyzes the codes and methods used in an attack to further improve security.

“At PLDT we are committed, as the country’s leading technology provider, to making innovations as accessible as possible to our clients. That includes ensuring they are properly equipped against the ever-evolving cyber threat landscape of today. In the world we live in, businesses cannot afford to view this as ‘optional’. Together with ePLDT, it is our goal to provide customers with an end-to-end cyber security framework specifically for their needs, to anticipate, mitigate and prevent damages to their business and reputation,” says Jovy Hernandez, Senior Vice President & Head of PLDT and Smart Enterprise Groups.

“When it comes to cyber security, it is no longer enough for companies to employ the traditional security measure that covers skills, process and technology. Nowadays, it is imperative for every organization to build a very strong capability on Cyber Threat Intelligence, aiming to identify the threat long before it reaches our respective network environment. Covering all of these, however, may be difficult for companies whose expertise is limited in the area of Cyber Security. This is why we at ePLDT are fulfilling our mission as an enabler of businesses by offering an end-to-end cyber security solution that assures resiliency against the most devastating cyber attacks.” Said ePLDT Group Chief Operating Officer Nerisse Ramos.

Thanks for sharing useful information.IQ Telecom is a company which is provides Best <a href="https://www.iqtelecom.net/voip-solutions"> VoIP Solution Service</a>.They are available 24*7 hours.If you want to instant support then you can contact toll free number +1-888-899-4471.The world is getting increasingly interconnected with every year as we continue walking forward into this web age. Thus, global calling will keep winding up more imperative for a wide range of organizations.

Jack |May 18, 2018

This is a nice post and i appreciate the above mentioned information.we are DID Numbers Provider. You can get Numbers from us at affordable price.

This content is wonderful, informative. It can collect all the information and it has really great effect on the new technology which is found now a days.Thanks for sharing it. Techavera providing the best Talend Training Course in noida Visit us For Quality Learning.

The central government has introduced another online organization called "Know Your PAN" to affirm or favor new and existing PAN numbers. http://pancardstatus1.page.tl/

pan card download |Apr 19, 2018

The central government has introduced another online organization called "Know Your PAN" to affirm or favor new and existing PAN numbers.

pan card status |Apr 17, 2018

It is likewise issued to remote nationals, (for example, speculators) subject to a substantial visa and subsequently, it isn't satisfactory as a proof of Indian citizenship.<a href="https://pancardstatus846023753.wordpress.com/">pan card download </a>

You have picked up a very interesting topic and molded it perfectly to gain readers’ attention. What makes your article connect is the language, which is very easy to understand. Well, mission accomplished I must say!Coming to my work, I have been an active contributor to the powerful Android app, Falcon Super Cleaner. It is one of the most trusted
cache cleaner designed to optimize the performance of your Android device with its actually quite easy-to-use interface.

I finally found great post here.I will get back here. I just added your blog to my bookmark sites. thanks.Quality posts is the crucial to invite the visitors to visit the web page, that's what this web page is providing.

I am amzaed by the way you have explained things in this post. This post is quite interesting and i am looking forward to read more of your posts.Norton Support Number UK

Restaurant Menu |Mar 10, 2018

A record-setting Blizzard hit the Northeastern piece of the United States in 2016. Meter-high snow heap obstructed the street and individuals were caught at home. When they hurried to the close-by market to get some nourishment, they found that the greater part of the sustenance was sold out. https://www.menuprice.info/

herpesdatingweb |Mar 07, 2018

When you have Herpes it can feel like you are all alone in the world. http://www.herpesdatingweb.com is the best place for you!. The Best Herpes Dating Sites for Single men and women who have herpes. We designed this for you in order to connect you with people that share that same ordeal in life. Share your experiences and thoughts with others, start new friendships or maybe even find that special someone.

jadegraham |Mar 02, 2018

I like this post,And I guess that they having fun to read this post,they shall take a good site to make a information,thanks for sharing it to me.
numero de voyance

jasmine lloyd |Feb 28, 2018

This is the first time i am visiting your site.....In my opinion you are doing a great job for your readers....I really like your content that you did include in your site....Expecting this kind of informative news from this site...